It was designed to provide a limited amount of security to your Macintosh system with emphasis on "security without modification" in its processes. It is completely safe to use and will help you detect if someone is trying to use your Mac in your absence.